1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
11

21. The most overlooked people in information security are:

Computers and Technology
1 answer:
yulyashka [42]3 years ago
8 0

Answer: D. janitors and guards

Explanation:

Information security simply means the protection of information from an unauthorized use or access.

The most overlooked people in information security are the janitors and the guards. Due to the fact that they're at the bottom of the organizational chart, they tend to be overlooked and not given the respect that they deserve.

You might be interested in
Which computers were the first PCs with a GUI<br> MS-DOS <br> Linux<br> Windows<br> Mac
sergeinik [125]

Answer:

The first computer with a GUI were linux, microsoft and apple.

Explanation:

I think this is right. Hope it helped <3

8 0
3 years ago
Read 2 more answers
Which of these is a poetic device walt whitman often uses to emphasize certain ideas in his poems?a. meterb. alliterationc. rhet
Ivanshal [37]
Alliteration (apex) i just guessed on it and got it right
5 0
3 years ago
In an experiment in which participants sat in an office and then were asked to remember what they saw in the office, participant
Inessa [10]

Answer:

The answer to this question is the "schemas".

Explanation:

A schema is plural schemata or schemas that defines a pattern of logic or action that constitutes classifications of data and the connections among them. In a computer science schemas is an organized structure for a database and all the operation of data modeling leads by schema. So the answer to this question is schemas

6 0
3 years ago
Tell four permanent icons on the desktop​
Alex777 [14]

Answer:

Desktop icons include Computer, your personal folder, Network, the Recycle Bin, Internet Explorer, and Control Panel. 1. Right-click an empty area of the desktop, and then click Personalize.

To arrange icons by name, type, date, or size, right-click a blank area on the desktop, and then click Arrange Icons. Click the command that indicates how you want to arrange the icons (by Name, by Type, and so on).

5 0
3 years ago
Which of the following trims would be used at the beginning of a scene?
Ad libitum [116K]

Answer: a i think

Explanation:

6 0
3 years ago
Other questions:
  • You’re responsible for an always-on VPN connection for your company and have been told that it must utilize the most secure mode
    12·1 answer
  • Consider an interface p ublic interface NumberFormatter { String format (in n); } Provide four classes that implement this inter
    15·1 answer
  • Which of the following is an Example of a technical (“hard”) skill
    6·2 answers
  • Computer recycling, electronic recycling or e-waste recycling is the disassembly and Most electronic waste is sent to landfills
    6·1 answer
  • True/False - According to CP-14 Sale of Modular Homes, a licensee who sells land and a modular home to be affixed to the land, t
    11·1 answer
  • What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz
    13·1 answer
  • Convert 128 GB into KB​
    8·2 answers
  • By itself, the human eye cannot see anything in three dimensions. What does the passage say enables us to see the world in 3-D?
    11·2 answers
  • What is a benefit of an account with interest?
    5·1 answer
  • What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!